We are working with DirSec to coordinate prizes for both the first place advanced user as well as the "most improved" novice user.

We are working with DirSec to coordinate prizes for both the first place advanced user as well as the "most improved" novice user.

−

−

=== Regrets ===

−

If you can't make the CTF session on Wednesday, no worries! Denver OWASP will be hosting the CTF session the previous night, on Wednesday 21 January 2009 at Raytheon Polar in Centennial, CO. See the [http://www.owasp.org/index.php/Denver Denver OWASP page] for more info!

OWASP Boulder

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Next Meeting

Please join the Boulder OWASP Chapter on Thursday, February 19, 2009 at Staples for a presentation by Martin Stenkilde, IBM Rational Certified Senior IT Specialist. This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified.

We will also be taking nominations for a new Chapter Chair or Co-Chairs and will vote at our April meeting. No meeting in March in lieu of SnowFROC on March 5th. Please see the conference website at http://snowfroc.com for all the details and to register. Registration is *FREE* but mandatory to ensure we don't oversubscribe venue capacity.

Presentation: Web Application Security: Hacking 101

Few can argue that web applications present a significant threat of attacks for State Government Organizations.

In fact Gartner research indicates that 75% of today’s attacks occur at the application level and 80% of organizations will experience an application security incident by 2010.
Cost of the data breach at TJX soars to $256M, Boston Globe—August 2007
Monster says data loss involved 1.3 million names, Reuters—August 2007
Credit Card Information Stolen from State of Indiana’s website, InfoWeek—January 2007

Are you confident this won’t happen to you?
This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified.

In this session, you will learn about:

* The importance of web application security – today's most significant online threat
* The three most common web application attacks – how they occur, and what can be done to prevent them
* Manual versus automated approaches for scanning and identifying web application vulnerabilities
* How IBM Rational AppScan, an automated vulnerability scanner, can help you automate more of what you are doing manually today
* Best practices for fixing vulnerabilities once they have been identified
* Making web application security part of the entire development lifecycle

Agenda

Sponsor: IBM Rational
Speaker: Martin Stenkilde, IBM Rational Certified Senior IT Specialist
Martin, a native Dane, started his professional career in quality assurance while working for Rational Software's European Headquarter in Amsterdam. Martin also spent time working for Zyntax, a Premier IBM Business Partner, where he functioned as the primary Performance and Security Testing Consultant for 5 years. Martin then joined the IBM Rational Specialty team, and is a certified IBM Test Manager, WebSphere Solutions Specialist, ISEB Professional, and holds a master certification from the Open Group.

Logistics

In order to participate in the CTF "hands on" you will need to bring a wifi equipped laptop. Many of the challenges in the CTF can be solved without any special tools. However, for those challenges that require tools, we recommend the OWASP LiveCD. Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined. We will have LiveCD copies on hand at the meeting also.

Prizes

We are working with DirSec to coordinate prizes for both the first place advanced user as well as the "most improved" novice user.

We will have a panel to discuss the problems, challenges, and successes when working to integrate business needs between the Audit, Security, and Compliance IT functional groups. These groups sometimes seem to work at cross-purposes, and to some business units, these IT groups are at odds with day-to-day business objectives. The panelists will present anecdotes and events to demonstrate challenges and successes in current and previous positions. We will also have an extended Q&A and will be soliciting your input. If you have questions or areas you would like covered, please email the Education VP ahead of time at education AT isaca-denver D0T org

4/1/2008 Yes! There's an April meeting! List-server FUBAR; switching to manual
We've been having trouble with our list server. The last thing through was an inadvertent cancellation, so you should have all gotten an individual message to say that there IS a meeting in April!

2/28/2008 - Dariush Rusta has volunteered to be the Project Manager for the Front Range OWASP Conference on June 10th ( THANKS Dariush). More info info to follow later...

What should I expect to see at a bOWASP meeting?

Each speaker will be encouraged to cover:

- demonstration of the threat ( "look! I got EVERYONE'S credit card #!")
- overview/sample of vulnerable code, preferably in PHP, Java, or .Net env.
- some details regarding how to correct the code
- some thoughts as to how to test for the problem and/or "immunize" against it during a typical SDLC
- additional tools and references

The purpose of the CTF is twofold. Advanced users can test their AppSec acumen by tackling the challenges on their own. Beginning users can learn AppSec fundamentals as they are guided through the challenges by the friendly chapter leaders and advanced users.

Whilst seemingly technical in nature, the CTF will also be of interest to managers, developers and executives, as it provides a simple way to demonstrate and communicate the serious impact of many AppSec vulnerabilities.